General

  • Target

    FunTime.zip

  • Size

    7.5MB

  • Sample

    250209-mxp1gaxner

  • MD5

    b7511307754d58daffd30177fe37ac76

  • SHA1

    f3b6bc9b85c26c61c71c41246a6ea53b011a3687

  • SHA256

    429f9b84b71f65702359b2dac0a962322862e7c0c33e00685100c0699ba4197b

  • SHA512

    0324c3e72b96b7873b9470ad88048cf5a4f78e47213b3e487368c2565a54a12af5b7a120813fcaf04866137a7e4f16519c63443db6f1c58183b708fda30fd6e0

  • SSDEEP

    196608:795g5lAQWr9VHp83GvCO1XiGh2FEZ50u9rqc:A5l/Wr9V+CH1XPh2O39rX

Malware Config

Targets

    • Target

      HackByINC.exe

    • Size

      6.8MB

    • MD5

      6ca3af9f2b35018656c3e3c50fed4d5b

    • SHA1

      db76da5f8cfee5c4ad613d238231968608f4576e

    • SHA256

      1f36c3cb1c8b3cf49b38b47ca5f51c81fb0c0e089ec23e915308467f0515bcc1

    • SHA512

      249711de4ca1fdda7582f2236cad821e6e597a37f182a0fc61d3e77c93355403549c54228b3a326f195ae3df2f43e6e1e85bfbbfae18c2390beab673d4538453

    • SSDEEP

      98304:vvkwN+MdA5wqMXh8MMhJMjarJaon7JPzf+JiUCS3swhzqgez7DoDZDJ1n6hBnLnU:vvV1UB6ylnlPzf+JiJCsmFMvcn6hVvQ

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks